General
-
Target
Bluecord_2.3.apk
-
Size
114.0MB
-
Sample
241103-b291na1fpl
-
MD5
fe4092405d8e76ce76859332d7a7dce3
-
SHA1
0a2eec933443da031c8cd5c2716bec3c3ba04f66
-
SHA256
290d702937ee49ecce47441eabe2b15bab9d0332ed37341367880c02ff61019e
-
SHA512
4a43ec798c26e4682b8157f4c85213b6169efc97caeb465fee98a89a15be2766e05bcbd533c658752aacc3d237c1a9639a296f66a8f5aa5385061cb6622014eb
-
SSDEEP
1572864:hu+ITZAItE1MtnHcPHUv6i2rWI4B2suLLpMnw38zzlGtVltVuFJvDCCkeK:hupgM8PUv6iGWbuLLpMnY8z4tp+CCk7
Static task
static1
Behavioral task
behavioral1
Sample
Bluecord_2.3.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Bluecord_2.3.apk
-
Size
114.0MB
-
MD5
fe4092405d8e76ce76859332d7a7dce3
-
SHA1
0a2eec933443da031c8cd5c2716bec3c3ba04f66
-
SHA256
290d702937ee49ecce47441eabe2b15bab9d0332ed37341367880c02ff61019e
-
SHA512
4a43ec798c26e4682b8157f4c85213b6169efc97caeb465fee98a89a15be2766e05bcbd533c658752aacc3d237c1a9639a296f66a8f5aa5385061cb6622014eb
-
SSDEEP
1572864:hu+ITZAItE1MtnHcPHUv6i2rWI4B2suLLpMnw38zzlGtVltVuFJvDCCkeK:hupgM8PUv6iGWbuLLpMnY8z4tp+CCk7
Score8/10-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Acquires the wake lock
-
Legitimate hosting services abused for malware hosting/C2
-
Queries information about active data network
-
Checks the presence of a debugger
-